ID PACKETSTORM:11389 Type packetstorm Reporter Halcyon Skinner Modified 1999-11-23T00:00:00
Description
`Reply-To: Halcyon Skinner <hskinner@JHSPH.EDU>
Vulnerable Application:
Sun Microsystems NetBeans (recently renamed to Forte') Java IDE
Versions tested:
Netbeans Developer 3.0 Beta
Forte Community Edition 1.0 Beta
unknown if earlier versions have vulnerability
Platform tested:
Windows NT 4.0
unknown if other platforms have vulnerability
Description:
The IDE includes an internal HTTP server to try Java code. The settings
indicate that access must be explicitly granted on a per IP address bases.
However, when service is enabled for one machine, the HTTP server allows
remote access to root and all subdirectories from any machine. NOTE, for
the NetBeans 3.0 Beta version, this is the default activity. Therefore, no
action is required by the user for the vulnerability to exist. Under the
Forte' 1.0 Beta version, a user must enable at least one address in the
HTTP server settings for the vulnerability to exist. However, once a
single IP address is entered, any machine can connect to the internal HTTP
server port (default is 8082). Even if all IP addresses are removed, the
server continues to allow connections when the IDE is running.
Example:
While the IDE is running connecting with any browser to
http://vvv.xxx.yyy.zzz:8082/..
provides a listing of the root directory.
Sub-directories can then be accessed.
Solution (work around):
1) Set the HTTP Server "Enable" setting to False in Project settings.
or
2) Remove the HTTP Server module in Global settings.
Vendor notified: Yes.
`
{"reporter": "Halcyon Skinner", "enchantments": {"score": {"vector": "NONE", "value": 7.5}, "dependencies": {"references": [], "modified": "2016-11-03T10:26:04"}, "vulnersScore": 7.5}, "published": "1999-11-23T00:00:00", "cvelist": [], "lastseen": "2016-11-03T10:26:04", "history": [], "id": "PACKETSTORM:11389", "sourceHref": "https://packetstormsecurity.com/files/download/11389/netbeans.java.txt", "objectVersion": "1.2", "sourceData": "`Reply-To: Halcyon Skinner <hskinner@JHSPH.EDU> \n \n \nVulnerable Application: \nSun Microsystems NetBeans (recently renamed to Forte') Java IDE \n \nVersions tested: \nNetbeans Developer 3.0 Beta \nForte Community Edition 1.0 Beta \nunknown if earlier versions have vulnerability \n \nPlatform tested: \nWindows NT 4.0 \nunknown if other platforms have vulnerability \n \nDescription: \nThe IDE includes an internal HTTP server to try Java code. The settings \nindicate that access must be explicitly granted on a per IP address bases. \nHowever, when service is enabled for one machine, the HTTP server allows \nremote access to root and all subdirectories from any machine. NOTE, for \nthe NetBeans 3.0 Beta version, this is the default activity. Therefore, no \naction is required by the user for the vulnerability to exist. Under the \nForte' 1.0 Beta version, a user must enable at least one address in the \nHTTP server settings for the vulnerability to exist. However, once a \nsingle IP address is entered, any machine can connect to the internal HTTP \nserver port (default is 8082). Even if all IP addresses are removed, the \nserver continues to allow connections when the IDE is running. \n \nExample: \nWhile the IDE is running connecting with any browser to \nhttp://vvv.xxx.yyy.zzz:8082/.. \nprovides a listing of the root directory. \nSub-directories can then be accessed. \n \nSolution (work around): \n1) Set the HTTP Server \"Enable\" setting to False in Project settings. \nor \n2) Remove the HTTP Server module in Global settings. \n \nVendor notified: Yes. \n \n`\n", "cvss": {"vector": "NONE", "score": 0.0}, "description": "", "references": [], "edition": 1, "title": "netbeans.java.txt", "type": "packetstorm", "modified": "1999-11-23T00:00:00", "hash": "5d8c3f240104232359f9405c48b106c72b4cad4ced0da84ca6f2cf86ee358e19", "bulletinFamily": "exploit", "hashmap": [{"hash": "708697c63f7eb369319c6523380bdf7a", "key": "bulletinFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "d4be9c4fc84262b4f39f89565918568f", "key": "cvss"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "description"}, {"hash": "61653dafffaa3efe358f580d6326694c", "key": "href"}, {"hash": "7bf037538aa1ea36e80183d72d7d5cd9", "key": "modified"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "7bf037538aa1ea36e80183d72d7d5cd9", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "d8dc421fea5f847f83f2453db523c541", "key": "reporter"}, {"hash": "de5992a6ebdb21b2c9951c9cb76dc67f", "key": "sourceData"}, {"hash": "37eb43c6569fb1f998fb5392e28121d7", "key": "sourceHref"}, {"hash": "e672eaaad6ae088fc60951ae138532c6", "key": "title"}, {"hash": "6466ca3735f647eeaed965d9e71bd35d", "key": "type"}], "href": "https://packetstormsecurity.com/files/11389/netbeans.java.txt.html", "viewCount": 0}